Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security strategy"
- Status: [object Object]
Google
Skills you'll gain: Computer Networking, Network Troubleshooting, Package and Software Management, Systems Administration, Cloud Infrastructure, IT Infrastructure, TCP/IP, Desktop Support, Network Security, Network Architecture, Computer Hardware, Linux, Encryption, Microsoft Windows, Lightweight Directory Access Protocols, Cybersecurity, Security Awareness, Technical Support, Software Installation, Help Desk Support
University of Illinois Urbana-Champaign
Skills you'll gain: Stakeholder Management, Corporate Strategy, Mergers & Acquisitions, Business Strategy, Global Marketing, Strategic Thinking, Organizational Strategy, Governance, Strategic Partnership, Corporate Finance, Business Ethics, Value Propositions, New Business Development, Growth Strategies, Strategic Decision-Making
University of Illinois Urbana-Champaign
Skills you'll gain: Business Strategy, Organizational Strategy, Strategic Leadership, Strategic Thinking, Strategic Planning, Business Management, Business Modeling, Strategic Decision-Making, Competitive Analysis, Value Propositions, Market Analysis, Analysis
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Security Controls, Enterprise Security, Information Privacy
University of Pennsylvania
Skills you'll gain: Data Ethics, Data Governance, Data Security, Governance, Business Strategy, Organizational Strategy, Business Transformation, Artificial Intelligence, Business Ethics, Analytics, Big Data, Machine Learning, Innovation, Algorithms
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Strategy, Data Visualization Software, SQL
Skills you'll gain: Computer Systems, Business Software, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Computer Hardware, Information Systems Security, Data Storage, Patch Management, Artificial Intelligence
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Strategic Decision-Making, Business Valuation, Private Equity, Mergers & Acquisitions, Game Theory, Corporate Strategy, Financial Analysis, Business Strategy, Investment Banking, Financial Modeling, Cash Flows, Growth Strategies, Corporate Finance
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Workflow Management, Stakeholder Engagement, Cyber Operations, Cybersecurity, Stakeholder Management, Security Information and Event Management (SIEM), Incident Response, Security Management, Computer Security Incident Management, Cyber Attacks, Stakeholder Communications, Incident Management, Event Monitoring, Security Controls, Data Security, Customer Relationship Building, Network Security, Team Oriented
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
Searches related to security strategy
In summary, here are 10 of our most popular security strategy courses
- Google IT Support:Â Google
- Corporate Strategy:Â University of Illinois Urbana-Champaign
- Business Strategy:Â University of Illinois Urbana-Champaign
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- AI Strategy and Governance:Â University of Pennsylvania
- Introduction to Cyber Security:Â New York University
- Network Security:Â ISC2
- Foundations: Data, Data, Everywhere:Â Google
- Introduction to Computers and Operating Systems and Security:Â Microsoft
- Advanced Valuation and Strategy - M&A, Private Equity, and Venture Capital:Â Erasmus University Rotterdam